- DocumentoGame Theorycargado porIJCSDF
- DocumentoPrivacy in Medical Data Publishingcargado porIJCSDF
- DocumentoSecure Model for Virtualization Layer in Cloud Infrastructurecargado porIJCSDF
- DocumentoApplication of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplicationcargado porIJCSDF
- DocumentoRationale and Design of the Access Specification Language RASPcargado porIJCSDF
- DocumentoA Detailed Strategy for Managing Corporation Cyber War Securitycargado porIJCSDF
- DocumentoA Survey on Malware Propagation, Analysis, and Detectioncargado porIJCSDF
- DocumentoProduct Piracy Preventioncargado porIJCSDF
- DocumentoA Review on Impacts of Cloud Computing on Digital Forensicscargado porIJCSDF
- DocumentoAssessing Database and Network Threats in Traditional and Cloud Computingcargado porIJCSDF
- DocumentoDomain Information Based Blacklisting Method for the Detection of Malicious Webpagescargado porIJCSDF
- DocumentoOn Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomiescargado porIJCSDF
- DocumentoAn Authentication Middleware for Prevention of Information Theftcargado porIJCSDF
- DocumentoDigital Forensic Trends and Futurecargado porIJCSDF
- DocumentoThe Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanismscargado porIJCSDF
- DocumentoThe Improved 32nd-Order Differential Attack on 8 Rounds of Misty2 without FL Functionscargado porIJCSDF
- DocumentoAutomated Signature Creator for a Signature Based Intrusion Detection System with Network Attack Detection Capabilities (Pancakes)cargado porIJCSDF
- DocumentoA Framework for Good Corporate Governance and Organisational Learning – An Empirical Studycargado porIJCSDF
- DocumentoInvestigating the Number of Users And Months to Make Tulungan Effective Against Self-Promoting Userscargado porIJCSDF
- DocumentoProposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shiftcargado porIJCSDF
- DocumentoAn Analysis of Base Station Location Accuracy within Mobile-Cellular Networkscargado porIJCSDF
- DocumentoA DRM Scheme Using File Physical Informationcargado porIJCSDF
- DocumentoAutomating the Generation of Fake Documents to Detect Network Intruderscargado porIJCSDF
- DocumentoAn Automated Malware Detection System for Android Using Behavior-Based Analysis AMDAcargado porIJCSDF
- DocumentoA Privacy-Preserving Approach for Collecting Evidence in Forensic Investigationcargado porIJCSDF
- DocumentoComputer Forensics between the Italian Legislation and Pragmatic Questionscargado porIJCSDF
- DocumentoTowards quantitative measures of Information Securitycargado porIJCSDF
- DocumentoEPSILON2cargado porIJCSDF
- DocumentoA Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with itcargado porIJCSDF
- DocumentoData Leak, Critical Information Infrastructure and the Legal Optionscargado porIJCSDF
- DocumentoModelling Based Approach for Reconstructing Evidence of VOIP Malicious Attackscargado porIJCSDF
- DocumentoSecure Network Communication Based on Text-to-Image Encryptioncargado porIJCSDF
- DocumentoSecurity Measurement Based On GQM To Improve Application Security During Requirements Stagecargado porIJCSDF
- DocumentoTrusted Document Signing Based on Use of Biometric (Face) Keyscargado porIJCSDF
- DocumentoTechnical Security Metrics Model in Compliance with ISO/IEC 27001 Standardcargado porIJCSDF
- DocumentoThe Problem to Consent to the Collection, Use, and Disclosure of Personal Information in Cyberspacecargado porIJCSDF
- DocumentoA Survey on Privacy Issues in Digital Forensicscargado porIJCSDF
- DocumentoMitigating Man-In-The-Browser Attacks with Hardware-based Authentication Schemecargado porIJCSDF
- DocumentoEfficient Foreground Extraction Based on Optical Flow and SMED for Road Traffic Analysiscargado porIJCSDF
- DocumentoTrust Measurements Yeld Distributed Decision Support in Cloud Computingcargado porIJCSDF
- DocumentoAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Methodcargado porIJCSDF
- DocumentoThe Right to Consent and Control Personal Information Processing in Cyberspacecargado porIJCSDF
- DocumentoRuntime Monitoring Technique to handle Tautology based SQL Injection Attackscargado porIJCSDF
- DocumentoEnhancing Advanced Encryption Standard S-Box Generation Based on Round Keycargado porIJCSDF
- DocumentoA New ShiftColumn Transformationcargado porIJCSDF
- DocumentoGenetic Algorithm Approach for Risk Reduction of Information Securitycargado porIJCSDF
- DocumentoFinite Field Arithmetic Architecture Based on Cellular Arraycargado porIJCSDF
- DocumentoSophistication Techniques of Fourth Generations in Neoteric Mobile LTE and LTE-Advancedcargado porIJCSDF
- DocumentoCertificate Revocation Management in VANETcargado porIJCSDF